Tue Jul 10 00:21:09 2012 OpenVPN 2.1.1 i686-pc-cygwin [SSL] [LZO2] built on May 7 2010 Tue Jul 10 00:21:20 2012 WARNING: Make sure you understand the semantics of --tls-remote before using it (see the man page). Tue Jul 10 00:21:20 2012 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables Tue Jul 10 00:21:21 2012 LZO compression initialized Tue Jul 10 00:21:21 2012 Control Channel MTU parms [ L:1556 D:140 EF:40 EB:0 ET:0 EL:0 ] Tue Jul 10 00:21:22 2012 Data Channel MTU parms [ L:1556 D:1450 EF:56 EB:135 ET:0 EL:0 AF:3/1 ] Tue Jul 10 00:21:22 2012 Local Options hash (VER=V4): '619088b2' Tue Jul 10 00:21:22 2012 Expected Remote Options hash (VER=V4): 'a4f12474' Tue Jul 10 00:21:22 2012 Attempting to establish TCP connection with :444 Tue Jul 10 00:21:22 2012 TCP connection established with :444 Tue Jul 10 00:21:22 2012 Socket Buffers: R=[8192->8192] S=[64512->64512] Tue Jul 10 00:21:22 2012 TCPv4_CLIENT link local: [undef] Tue Jul 10 00:21:22 2012 TCPv4_CLIENT link remote: :444 Tue Jul 10 00:21:22 2012 TLS: Initial packet from :444, sid=82f5fbd2 fc44f512 Tue Jul 10 00:21:22 2012 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Tue Jul 10 00:21:22 2012 VERIFY OK: depth=1, /C=ch/L=City/O=DOMAIN/CN=DOMAIN_VPN_CA/emailAddress=admin@domain.local Tue Jul 10 00:21:22 2012 VERIFY X509NAME OK: /C=ch/L=City/O=DOMAIN/CN=bsfw001/emailAddress=admin@domain.local Tue Jul 10 00:21:22 2012 VERIFY OK: depth=0, /C=ch/L=City/O=DOMAIN/CN=bsfw001/emailAddress=admin@domain.local Tue Jul 10 00:21:23 2012 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key Tue Jul 10 00:21:23 2012 Data Channel Encrypt: Using 128 bit message hash 'MD5' for HMAC authentication Tue Jul 10 00:21:23 2012 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key Tue Jul 10 00:21:23 2012 Data Channel Decrypt: Using 128 bit message hash 'MD5' for HMAC authentication Tue Jul 10 00:21:23 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA Tue Jul 10 00:21:23 2012 [bsfw001] Peer Connection Initiated with :444 Tue Jul 10 00:21:26 2012 SENT CONTROL [bsfw001]: 'PUSH_REQUEST' (status=1) Tue Jul 10 00:21:26 2012 PUSH: Received control message: 'PUSH_REPLY,route remote_host 255.255.255.255 net_gateway,route 172.20.0.0 255.255.255.0,route 10.0.32.0 255.255.255.0,dhcp-option DNS 10.0.32.70,dhcp-option DOMAIN domain.local,route 10.242.2.1,topology net30,ping 10,ping-restart 120,ifconfig 10.242.2.22 10.242.2.21' Tue Jul 10 00:21:26 2012 OPTIONS IMPORT: timers and/or timeouts modified Tue Jul 10 00:21:26 2012 OPTIONS IMPORT: --ifconfig/up options modified Tue Jul 10 00:21:26 2012 OPTIONS IMPORT: route options modified Tue Jul 10 00:21:26 2012 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Tue Jul 10 00:21:26 2012 ROUTE default_gateway=192.168.100.249 Tue Jul 10 00:21:26 2012 TAP-WIN32 device [LAN-Verbindung 3] opened: \\.\Global\{FA1FC066-E69A-406B-BC7D-B4160D568C50}.tap Tue Jul 10 00:21:26 2012 TAP-Win32 Driver Version 9.6 Tue Jul 10 00:21:26 2012 TAP-Win32 MTU=1500 Tue Jul 10 00:21:26 2012 Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.242.2.22/255.255.255.252 on interface {FA1FC066-E69A-406B-BC7D-B4160D568C50} [DHCP-serv: 10.242.2.21, lease-time: 31536000] Tue Jul 10 00:21:26 2012 Successful ARP Flush on interface [196612] {FA1FC066-E69A-406B-BC7D-B4160D568C50} Tue Jul 10 00:21:30 2012 TEST ROUTES: 4/4 succeeded len=4 ret=1 a=0 u/d=up Tue Jul 10 00:21:30 2012 C:\WINDOWS\system32\route.exe ADD MASK 255.255.255.255 192.168.100.249 Tue Jul 10 00:21:30 2012 Route addition via IPAPI succeeded [adaptive] Tue Jul 10 00:21:30 2012 C:\WINDOWS\system32\route.exe ADD 172.20.0.0 MASK 255.255.255.0 10.242.2.21 Tue Jul 10 00:21:30 2012 Route addition via IPAPI succeeded [adaptive] Tue Jul 10 00:21:30 2012 C:\WINDOWS\system32\route.exe ADD 10.0.32.0 MASK 255.255.255.0 10.242.2.21 Tue Jul 10 00:21:30 2012 Route addition via IPAPI succeeded [adaptive] Tue Jul 10 00:21:30 2012 C:\WINDOWS\system32\route.exe ADD 10.242.2.1 MASK 255.255.255.255 10.242.2.21 Tue Jul 10 00:21:30 2012 Route addition via IPAPI succeeded [adaptive] Tue Jul 10 00:21:30 2012 Initialization Sequence Completed Tue Jul 10 00:27:12 2012 TCP/UDP: Closing socket Tue Jul 10 00:27:12 2012 C:\WINDOWS\system32\route.exe DELETE 10.242.2.1 MASK 255.255.255.255 10.242.2.21 Tue Jul 10 00:27:12 2012 ROUTE: route deletion failed using DeleteIpForwardEntry: Falscher Parameter. Tue Jul 10 00:27:12 2012 Route deletion via IPAPI failed [adaptive] Tue Jul 10 00:27:12 2012 Route deletion fallback to route.exe Tue Jul 10 00:27:12 2012 C:\WINDOWS\system32\route.exe DELETE 10.0.32.0 MASK 255.255.255.0 10.242.2.21 Tue Jul 10 00:27:12 2012 ROUTE: route deletion failed using DeleteIpForwardEntry: Falscher Parameter. Tue Jul 10 00:27:12 2012 Route deletion via IPAPI failed [adaptive] Tue Jul 10 00:27:12 2012 Route deletion fallback to route.exe Tue Jul 10 00:27:12 2012 C:\WINDOWS\system32\route.exe DELETE 172.20.0.0 MASK 255.255.255.0 10.242.2.21 Tue Jul 10 00:27:12 2012 ROUTE: route deletion failed using DeleteIpForwardEntry: Falscher Parameter. Tue Jul 10 00:27:12 2012 Route deletion via IPAPI failed [adaptive] Tue Jul 10 00:27:12 2012 Route deletion fallback to route.exe Tue Jul 10 00:27:12 2012 C:\WINDOWS\system32\route.exe DELETE MASK 255.255.255.255 192.168.100.249 Tue Jul 10 00:27:12 2012 Route deletion via IPAPI succeeded [adaptive] Tue Jul 10 00:27:12 2012 Closing TUN/TAP interface Tue Jul 10 00:27:12 2012 SIGTERM[hard,] received, process exiting